From the course: Complete Guide to the AWS Well-Architected Framework
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Protecting data in transit at AWS - Amazon Web Services (AWS) Tutorial
From the course: Complete Guide to the AWS Well-Architected Framework
Protecting data in transit at AWS
- [Instructor] When it comes to protecting your data in transit to AWS, there's a number of choices depending if you're a developer or an end user. Depends on what service you're actually going to use in your design. AWS supports HTTPS endpoints for all regions, for all access to AWS, and they support HTTP endpoints using TLS if you're a developer and you're communicating using AWS APIs. So a much higher security level of developer endpoint access. If you're dealing with GovCloud regions, this would be a separate account. But perhaps you're having a design that involves GovCloud. Any FIPS connections use TLS 1.2, FIPs being the Federal Information Processing Standard. If you're using CloudFront, the content distribution network hosted by AWS, it supports encrypted endpoints for content using HTTPS and what's called field-level encryption. So your users uploading secure information to a web server hosted at AWS, that sensitive information provided by your user will be encrypted at the…
Contents
-
-
-
-
-
-
(Locked)
Security pillar overview2m 21s
-
(Locked)
Design principles7m 14s
-
(Locked)
Identity and Access Management2m 59s
-
(Locked)
Demo: IAM security overview4m 51s
-
(Locked)
Protecting AWS credentials3m 54s
-
(Locked)
Identify threats: Detective controls3m 25s
-
(Locked)
AWS detective controls for security4m 29s
-
(Locked)
Implement an auditing workflow3m 37s
-
(Locked)
Challenge: Review a CloudTrail event56s
-
(Locked)
Solution: Review a CloudTrail event1m 23s
-
(Locked)
Auditing and notifications4m 46s
-
(Locked)
Infrastructure protection4m 57s
-
(Locked)
Key AWS services for infrastructure protection5m 55s
-
(Locked)
Data protection methods2m 18s
-
(Locked)
Key AWS services for data protection3m 15s
-
(Locked)
Protecting your data at rest at AWS1m 50s
-
(Locked)
Protecting data in transit at AWS2m 43s
-
(Locked)
Responding to security incidents2m 33s
-
(Locked)
Managing incident response4m 27s
-
(Locked)
Demo: Using the Well-Architected Tool2m 12s
-
(Locked)
-
-
-
-
-